AWS Certified Security
Speciality
Learn how to respond and automate to security incidents in your account. How to harden the security of your AWS accounts. Detect and prevent malicious actors.
Get Access NowUSD $24.00
USD $60.00
(60% off)
This study course cannot be directly purchased.
You need to signup and submit an application to our early access program.
You need to signup and submit an application to our early access program.
This Course Includes:
1 Year Access
12.5
Hours of Video
65
Lectures
68
Follow Alongs
15
Cheat Sheets
214
Flashcards
5
Practice Exams
Individual Video Quizlets
Certificate of Completion
Course Outline
Introduction
10m 26s
Meet your Instructor
1m 42s
Lecture
Watch
Exam Guide Overview
5m 2s
Lecture
Watch
Why get AWS Security Certified?
3m 42s
Lecture
Watch
KMS
42m 15s
Introduction to KMS
4m 44s
Lecture
Watch
KMS Key policies
7m 11s
Lecture
Watch
KMS Key policies
5m 4s
Follow Along
Watch
KMS Grants
6m 21s
Lecture
Watch
KMS ViaService
5m 34s
Lecture
Watch
KMS Key Rotation
4m 10s
Lecture
Watch
KMS Import Material
5m 17s
Lecture
Watch
KMS CheatSheet
3m 54s
Cheatsheet
Watch
Macie
15m 22s
Introduction to Macie
3m 28s
Lecture
Watch
Macie Follow Along
7m 19s
Follow Along
Watch
Macie CheatSheet
4m 35s
Cheatsheet
Watch
CloudFront
55m 11s
Introduction to CloudFront
5m 30s
Lecture
Watch
CloudFront Key Pair
7m 22s
Follow Along
Watch
Origin Access Identity
3m 47s
Follow Along
Watch
HTTPS and SSL
4m 16s
Follow Along
Watch
Restrict Viewer Access
3m 22s
Follow Along
Watch
Signed Cookies
7m 58s
Follow Along
Watch
Signed URLs
7m 45s
Follow Along
Watch
Geo Restriction
3m 22s
Lecture
Watch
Lamba@Edge
5m 18s
Lecture
Watch
Public key and Field-level encryption
3m 22s
Lecture
Watch
CloudFront CheatSheet
3m 9s
Cheatsheet
Watch
IAM
48m
Introduction to IAM
7m 54s
Lecture
Watch
Cross-Account Roles
6m 47s
Lecture
Watch
IAM Credential Reports
4m 51s
Lecture
Watch
Permission Boundaries
6m 22s
Follow Along
Watch
Service Control Policies
5m 10s
Follow Along
Watch
STS
5m 34s
Lecture
Watch
Access Keys
5m 35s
Lecture
Watch
IAM CheatSheet
5m 47s
Cheatsheet
Watch
Cognito
44m 45s
Introduction to Cognito
4m 23s
Lecture
Watch
Web Indentity Federation
7m 12s
Lecture
Watch
User Pools Attributes
4m 28s
Follow Along
Watch
User Pools Policies
5m 10s
Follow Along
Watch
User Pools MFA and verifications
5m 34s
Follow Along
Watch
User Pools Advanced Security
5m 35s
Follow Along
Watch
Indentity Pools
7m 48s
Follow Along
Watch
Cognito CheatSheet
4m 35s
Cheatsheet
Watch
S3
58m 35s
Introduction to S3
5m 6s
Lecture
Watch
Presigned Urls
5m 14s
Follow Along
Watch
ACLs
7m 53s
Follow Along
Watch
Bucket Policies
7m 52s
Follow Along
Watch
SSE Encyption
5m 4s
Follow Along
Watch
CORS
6m 45s
Follow Along
Watch
CRR
5m 2s
Follow Along
Watch
Versioning
5m 40s
Follow Along
Watch
MFA Delete
4m 41s
Follow Along
Watch
S3 CheatSheet
5m 18s
Cheatsheet
Watch
Networking
1h 17m 33s
Introduction to Networking
4m 43s
Follow Along
Watch
DHCP
3m 22s
Lecture
Watch
DNS Flow Logs
3m 21s
Lecture
Watch
VPC Flow Logs
3m 39s
Follow Along
Watch
VPC Endpoints
5m 21s
Follow Along
Watch
Site to Site VPN Connection
5m 24s
Lecture
Watch
Client VPN Connection
7m 20s
Follow Along
Watch
Direct Connect
3m 22s
Lecture
Watch
NATs
3m 21s
Lecture
Watch
Bastion
7m 14s
Follow Along
Watch
ACM
4m 29s
Follow Along
Watch
SSL Termination
6m 24s
Lecture
Watch
VPC Peering
5m 14s
Follow Along
Watch
NACLs
4m 24s
Lecture
Watch
Security Groups
4m 2s
Lecture
Watch
Networking CheatSheet
5m 53s
Cheatsheet
Watch
WAF
46m 52s
Introduction to WAF
6m 41s
Lecture
Watch
OWASP Top 10
5m 13s
Lecture
Watch
WAF ACLs
5m 42s
Follow Along
Watch
WAF Rules
7m 54s
Follow Along
Watch
WAF Conditions
4m 3s
Follow Along
Watch
WAF Marketplace
4m 22s
Follow Along
Watch
CloudFormation WAF Rules
6m 19s
Follow Along
Watch
WAF CheatSheet
6m 38s
Cheatsheet
Watch
Various AWS Securities
1h 44m 12s
Introduction to Various AWS Securities
4m 3s
Lecture
Watch
Glacier Vault Lock policies
3m 48s
Follow Along
Watch
Shield
4m 13s
Lecture
Watch
Inspector
5m 41s
Follow Along
Watch
AWS Compliance Programs
3m 22s
Lecture
Watch
Artifact
4m 15s
Follow Along
Watch
Secrets Manager
3m 2s
Follow Along
Watch
SSM Sessions Manager
3m 57s
Follow Along
Watch
SSM Parameter Store
4m 46s
Follow Along
Watch
Elastic Beanstalk
5m 2s
Follow Along
Watch
CloudHSM
4m 48s
Follow Along
Watch
DynamoDB
5m 32s
Follow Along
Watch
CloudWatch
7m 32s
Lecture
Watch
Trusted Advisor - Security Checks
5m 1s
Lecture
Watch
EFS
4m 8s
Follow Along
Watch
EBS Encyption Root Volumes
5m 52s
Follow Along
Watch
RDS and Aurora
5m 39s
Follow Along
Watch
RedShift
6m 3s
Follow Along
Watch
EC2 Key pairs and SSH
7m 27s
Follow Along
Watch
Lambda
5m 22s
Follow Along
Watch
Various AWS Securities CheatSheet
4m 39s
Cheatsheet
Watch
Guard Duty
31m 7s
Introduction to Guard Duty
5m 26s
Lecture
Watch
Turning on Gaurd Duty
3m 30s
Follow Along
Watch
Generating Fake Findings
3m 54s
Follow Along
Watch
Reviewing Findings
3m 22s
Follow Along
Watch
List Management
5m 2s
Lecture
Watch
CloudWatch and Thrids
3m 25s
Lecture
Watch
Guard Duty CheatSheet
6m 28s
Cheatsheet
Watch
AWS Config
29m 45s
Introduction to AWS Config
4m 5s
Lecture
Watch
Turning on Config
7m 29s
Follow Along
Watch
Reviewing Inventory
3m 21s
Follow Along
Watch
Create a Rule
4m 56s
Follow Along
Watch
Create a Custom Rule
5m 2s
Follow Along
Watch
Config CheatSheet
4m 52s
Cheatsheet
Watch
Security Hub
31m 14s
Introduction to Security Hub
7m 14s
Lecture
Watch
Turning on Security Hub
6m 51s
Follow Along
Watch
Reviewing complaince
6m 44s
Follow Along
Watch
Automating an Incident Response
3m 26s
Follow Along
Watch
Security Hub CheatSheet
6m 59s
Cheatsheet
Watch
Athena
17m 24s
Introduction to Athena
3m 3s
Lecture
Watch
Creating a Table
6m 34s
Follow Along
Watch
Querying CloudTrail
3m 9s
Follow Along
Watch
Athena CheatSheet
4m 38s
Cheatsheet
Watch
CloudTrail
48m 23s
Introduction to CloudTrail
6m 1s
Lecture
Watch
Anatomy of a CloudTrail Event
4m 29s
Lecture
Watch
EventHistory
6m 52s
Lecture
Watch
Management Events vs Data Events
6m 45s
Lecture
Watch
Configuing CloudTrail fo full converage
4m 59s
Lecture
Watch
CloudTrail to CloudWatch
7m 47s
Follow Along
Watch
Unsupported Services
4m 22s
Lecture
Watch
CloudTrail CheatSheet
7m 8s
Cheatsheet
Watch
Active Directory on AWS
25m 43s
Introduction to AD
5m 44s
Lecture
Watch
Using Active Directory Federation Services (ADFS)
5m 3s
Lecture
Watch
Creating an Active Directory
3m 45s
Follow Along
Watch
Authenicating to Active Directory
5m 45s
Follow Along
Watch
Active Directory CheatSheet
5m 26s
Cheatsheet
Watch
Miscellaneous Security
45m 56s
CFN Nag
5m 12s
Follow Along
Watch
Pacu
4m 33s
Follow Along
Watch
CloudGoat
5m 35s
Follow Along
Watch
Incident Response Plans
5m 14s
Lecture
Watch
Shared Responsibility Model
6m 12s
Lecture
Watch
Chaos Engineering
7m 22s
Lecture
Watch
Kali Linux
5m 58s
Lecture
Watch
Metasploit
5m 50s
Lecture
Watch
AWS Unusable MFA Device
Lecture
Watch
Security Related Concepts
25m 38s
AWS Acceptable Use Policy (AUPS)
5m 2s
Lecture
Watch
Runbooks vs Playbooks
3m 25s
Lecture
Watch
Principle of Least Privilege
6m 42s
Lecture
Watch
Incident Response Plan
3m 23s
Lecture
Watch
Command and Control Server
3m 42s
Lecture
Watch
PPI and PHI
3m 24s
Lecture
Watch
AWS Security Scenarios
5m 6s
What to do if your account is compromised?
3m 23s
Lecture
Watch
What happens if you delete the CMK key material on AWS?
1m 43s
Lecture
Watch